Releases: crowdsecurity/cs-firewall-bouncer
Releases · crowdsecurity/cs-firewall-bouncer
v0.0.34
What's Changed
- enhance: Allow disabling ipv4 by @LaurenceJJones in #410
- enhance: Add error to metrics log lines when strconv fails by @LaurenceJJones in #416
- nftables: use named counters to track processed/dropped metrics by @blotus in #417
- warn user if DOCKER-USER chain is detected but not configured by @blotus in #413
- do not exit with an error if stopped by SIGTERM or SIGINT by @blotus in #414
- enhance: Update strconv to uint64 for 32 bit cpus by @LaurenceJJones in #419
- enhance: allow user to specify v4 and v6 chains independantly by @LaurenceJJones in #411
Full Changelog: v0.0.33...v0.0.34
v0.0.34-rc1
What's Changed
- enhance: Allow disabling ipv4 by @LaurenceJJones in #410
- enhance: Add error to metrics log lines when strconv fails by @LaurenceJJones in #416
- nftables: use named counters to track processed/dropped metrics by @blotus in #417
- warn user if DOCKER-USER chain is detected but not configured by @blotus in #413
- do not exit with an error if stopped by SIGTERM or SIGINT by @blotus in #414
- enhance: Update strconv to uint64 for 32 bit cpus by @LaurenceJJones in #419
- enhance: allow user to specify v4 and v6 chains independantly by @LaurenceJJones in #411
Full Changelog: v0.0.33...v0.0.34-rc1
v0.0.33
v0.0.33-rc2
fix https://github.com/crowdsecurity/cs-firewall-bouncer/issues/399 (…
v0.0.33-rc1
v0.0.32-rc2
What's Changed
- CI: use golangci-lint 1.61 by @mmetc in #384
- pf: properly flush outgoing connections when adding a banned ip by @mmetc in #389
- simplify pf state flush by @mmetc in #392
- CI: python tests with uv & typing by @mmetc in #393
- Disable timeouts for Edgerouter 10x ipsets by @oddlid in #394
- CI: golangci-lint v2 by @mmetc in #398
- Ensure monotonic traffic metrics by @mmetc in #400
- add an option to allow adding a comment to iptables rules by @verybadsoldier in #386
- refactor metrics registration by @mmetc in #401
- lint: update configuration, reserve fmt.Print for debugging by @mmetc in #402
- update dependencies by @mmetc in #406
- lint update+formatting by @mmetc in #407
New Contributors
- @oddlid made their first contribution in #394
- @verybadsoldier made their first contribution in #386
Full Changelog: v0.0.31...v0.0.32-rc2
v0.0.32
What's Changed
- CI: use golangci-lint 1.61 by @mmetc in #384
- pf: properly flush outgoing connections when adding a banned ip by @mmetc in #389
- simplify pf state flush by @mmetc in #392
- CI: python tests with uv & typing by @mmetc in #393
- Disable timeouts for Edgerouter 10x ipsets by @oddlid in #394
- CI: golangci-lint v2 by @mmetc in #398
- Ensure monotonic traffic metrics by @mmetc in #400
- add an option to allow adding a comment to iptables rules by @verybadsoldier in #386
- refactor metrics registration by @mmetc in #401
- lint: update configuration, reserve fmt.Print for debugging by @mmetc in #402
- update dependencies by @mmetc in #406
- lint update+formatting by @mmetc in #407
New Contributors
- @oddlid made their first contribution in #394
- @verybadsoldier made their first contribution in #386
Full Changelog: v0.0.31...v0.0.32
v0.0.32-rc1
What's Changed
- CI: use golangci-lint 1.61 by @mmetc in #384
- pf: properly flush outgoing connections when adding a banned ip by @mmetc in #389
- simplify pf state flush by @mmetc in #392
- CI: python tests with uv & typing by @mmetc in #393
- Disable timeouts for Edgerouter 10x ipsets by @oddlid in #394
- CI: golangci-lint v2 by @mmetc in #398
- Ensure monotonic traffic metrics by @mmetc in #400
- add an option to allow adding a comment to iptables rules by @verybadsoldier in #386
- refactor metrics registration by @mmetc in #401
- lint: update configuration, reserve fmt.Print for debugging by @mmetc in #402
New Contributors
- @oddlid made their first contribution in #394
- @verybadsoldier made their first contribution in #386
Full Changelog: v0.0.31...v0.0.32-rc1
v0.0.31
v0.0.30
What’s Changed
- Add support for reporting number of bytes/packets that were blocked by the bouncer (#365)
- Improve performance when collecting metrics for prometheus and crowdsec by using
iptables-save
/ embedded counters in thenft
rules (#365) - Improve performance in
iptables
/ipset
mode during insertion (#365) - In
iptables
/nftables
mode, sets are now split per crowdsec origin (CAPI
,crowdsec
,list:XXX
, ...) to provide accurate reporting (#365)